General
-
Target
bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35
-
Size
1.3MB
-
Sample
241221-tkn1zasmc1
-
MD5
de16d320bfca773b71705eaf20fa8564
-
SHA1
88164db96bb91a4277de46cc4c0f94cd84f4107f
-
SHA256
bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35
-
SHA512
514486644ef14ca6cad57c043cc556595f87f3e23d2c355b59f7adb8501f4d494694d7ccf9e9ab8c96c5d7ebe623d01efb248930fc7d95121f6d34f98fda45e6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35
-
Size
1.3MB
-
MD5
de16d320bfca773b71705eaf20fa8564
-
SHA1
88164db96bb91a4277de46cc4c0f94cd84f4107f
-
SHA256
bd3f5de188a7e68c8cea0d3aec6339219536359717697ff1b1e965728acebe35
-
SHA512
514486644ef14ca6cad57c043cc556595f87f3e23d2c355b59f7adb8501f4d494694d7ccf9e9ab8c96c5d7ebe623d01efb248930fc7d95121f6d34f98fda45e6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-